CVE-2025-13109: CWE-639 Authorization Bypass Through User-Controlled Key in realmag777 HUSKY – Products Filter Professional for WooCommerce
CVE-2025-13109 is a medium severity vulnerability in the HUSKY – Products Filter Professional for WooCommerce WordPress plugin, affecting all versions up to 1. 3. 7. 2. It is an authorization bypass issue (CWE-639) caused by missing validation on a user-controlled key in the woof_add_query and woof_remove_query functions. Authenticated users with subscriber-level access or higher can exploit this flaw to insert or remove arbitrary saved search queries in any user's profile, including administrators. The vulnerability does not impact confidentiality or availability but can affect the integrity of user data. No user interaction beyond authentication is required, and the attack can be performed remotely over the network. There are no known exploits in the wild yet, and no patches have been published at the time of disclosure. European organizations using this plugin in their WooCommerce stores should prioritize validation and access control improvements to mitigate risk.
AI Analysis
Technical Summary
The HUSKY – Products Filter Professional for WooCommerce plugin, widely used in WordPress e-commerce sites, suffers from an Insecure Direct Object Reference (IDOR) vulnerability identified as CVE-2025-13109. This vulnerability arises from the lack of proper validation on a user-controlled key parameter within the plugin's woof_add_query and woof_remove_query functions. These functions handle the insertion and removal of saved search queries associated with user profiles. Because the plugin fails to verify that the authenticated user is authorized to modify the targeted saved search queries, attackers with subscriber-level privileges or higher can manipulate the saved queries of any user, including administrators. This flaw allows an attacker to alter the integrity of user-specific data, potentially disrupting administrative workflows or causing confusion by injecting or deleting saved filters. The vulnerability is remotely exploitable over the network without requiring user interaction beyond authentication. The CVSS 3.1 base score is 4.3, reflecting a medium severity primarily due to the limited impact on confidentiality and availability but notable integrity concerns. No patches or known exploits are available at the time of publication, emphasizing the need for proactive mitigation by affected parties.
Potential Impact
For European organizations operating WooCommerce stores with the vulnerable HUSKY Products Filter Professional plugin, this vulnerability poses a risk to data integrity within user profiles. Attackers with low-level authenticated access can manipulate saved search queries of other users, including administrators, potentially leading to administrative confusion, disruption of normal operations, or indirect impacts on decision-making processes that rely on saved filters. While the vulnerability does not expose sensitive data or cause service outages, the integrity compromise could be leveraged as part of a broader attack chain or social engineering campaign. Organizations in sectors with strict data governance or e-commerce regulations (e.g., GDPR compliance) may face reputational damage or regulatory scrutiny if such integrity issues lead to operational errors or customer dissatisfaction. The medium severity rating suggests moderate urgency but does not indicate immediate critical risk.
Mitigation Recommendations
1. Immediately restrict plugin access to trusted roles only, minimizing subscriber-level permissions where possible. 2. Implement custom validation checks in the plugin code or via WordPress hooks to ensure that any modification of saved search queries is authorized and limited to the owning user or administrators. 3. Monitor user activity logs for unusual modifications to saved queries, especially those affecting administrator profiles. 4. If feasible, temporarily disable the HUSKY Products Filter Professional plugin until an official patch is released. 5. Engage with the plugin vendor or community to track patch releases and apply updates promptly once available. 6. Conduct regular audits of user permissions and plugin configurations to prevent privilege escalation. 7. Educate users about the risks of unauthorized access and enforce strong authentication controls to reduce the likelihood of compromised subscriber accounts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-13109: CWE-639 Authorization Bypass Through User-Controlled Key in realmag777 HUSKY – Products Filter Professional for WooCommerce
Description
CVE-2025-13109 is a medium severity vulnerability in the HUSKY – Products Filter Professional for WooCommerce WordPress plugin, affecting all versions up to 1. 3. 7. 2. It is an authorization bypass issue (CWE-639) caused by missing validation on a user-controlled key in the woof_add_query and woof_remove_query functions. Authenticated users with subscriber-level access or higher can exploit this flaw to insert or remove arbitrary saved search queries in any user's profile, including administrators. The vulnerability does not impact confidentiality or availability but can affect the integrity of user data. No user interaction beyond authentication is required, and the attack can be performed remotely over the network. There are no known exploits in the wild yet, and no patches have been published at the time of disclosure. European organizations using this plugin in their WooCommerce stores should prioritize validation and access control improvements to mitigate risk.
AI-Powered Analysis
Technical Analysis
The HUSKY – Products Filter Professional for WooCommerce plugin, widely used in WordPress e-commerce sites, suffers from an Insecure Direct Object Reference (IDOR) vulnerability identified as CVE-2025-13109. This vulnerability arises from the lack of proper validation on a user-controlled key parameter within the plugin's woof_add_query and woof_remove_query functions. These functions handle the insertion and removal of saved search queries associated with user profiles. Because the plugin fails to verify that the authenticated user is authorized to modify the targeted saved search queries, attackers with subscriber-level privileges or higher can manipulate the saved queries of any user, including administrators. This flaw allows an attacker to alter the integrity of user-specific data, potentially disrupting administrative workflows or causing confusion by injecting or deleting saved filters. The vulnerability is remotely exploitable over the network without requiring user interaction beyond authentication. The CVSS 3.1 base score is 4.3, reflecting a medium severity primarily due to the limited impact on confidentiality and availability but notable integrity concerns. No patches or known exploits are available at the time of publication, emphasizing the need for proactive mitigation by affected parties.
Potential Impact
For European organizations operating WooCommerce stores with the vulnerable HUSKY Products Filter Professional plugin, this vulnerability poses a risk to data integrity within user profiles. Attackers with low-level authenticated access can manipulate saved search queries of other users, including administrators, potentially leading to administrative confusion, disruption of normal operations, or indirect impacts on decision-making processes that rely on saved filters. While the vulnerability does not expose sensitive data or cause service outages, the integrity compromise could be leveraged as part of a broader attack chain or social engineering campaign. Organizations in sectors with strict data governance or e-commerce regulations (e.g., GDPR compliance) may face reputational damage or regulatory scrutiny if such integrity issues lead to operational errors or customer dissatisfaction. The medium severity rating suggests moderate urgency but does not indicate immediate critical risk.
Mitigation Recommendations
1. Immediately restrict plugin access to trusted roles only, minimizing subscriber-level permissions where possible. 2. Implement custom validation checks in the plugin code or via WordPress hooks to ensure that any modification of saved search queries is authorized and limited to the owning user or administrators. 3. Monitor user activity logs for unusual modifications to saved queries, especially those affecting administrator profiles. 4. If feasible, temporarily disable the HUSKY Products Filter Professional plugin until an official patch is released. 5. Engage with the plugin vendor or community to track patch releases and apply updates promptly once available. 6. Conduct regular audits of user permissions and plugin configurations to prevent privilege escalation. 7. Educate users about the risks of unauthorized access and enforce strong authentication controls to reduce the likelihood of compromised subscriber accounts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-12T23:36:07.758Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69302ef1720cedca79452381
Added to database: 12/3/2025, 12:37:05 PM
Last enriched: 12/10/2025, 1:45:32 PM
Last updated: 1/17/2026, 3:16:03 PM
Views: 131
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15530: Reachable Assertion in Open5GS
MediumCVE-2026-0725: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in cyberlord92 Integrate Dynamics 365 CRM
MediumCVE-2025-8615: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in cubewp1211 CubeWP Framework
MediumCVE-2025-14078: CWE-862 Missing Authorization in shoheitanaka PAYGENT for WooCommerce
MediumCVE-2025-10484: CWE-288 Authentication Bypass Using an Alternate Path or Channel in FmeAddons Registration & Login with Mobile Phone Number for WooCommerce
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.